ABSTRACT :
Many of the organizations connect plenty of numbers of systems to establish a network which will intern make their work easier to share their folders and files. As many systems are involved security concern is the major aspect while attaching such systems, and wanted to keep track of the network system activities for security motive. A Monitoring mechanism in a computer grid is used to observe all the ongoing activities of the whole network. The main objective is to gather details from the monitoring environment and the system. In this paper, various network parameters of the established computer networks are observed using the developed monitoring mechanism such as IP address, files transferred and Mac address.
EXISTING SYSTEM:
A large number of the organization connects plenty of numbers of systems to build a network because of which they can easily share their files and folders. Multiple systems security are being connected and privacy plays a major role, so wanted to monitor all the ongoing network activities wanted to monitored for security purpose. Networks can be monitored by using Wireshark [8] and scrutinizing mechanism to precisely determine the utilization of various resources, traffic flows and performance-related parameters on a network. The prime characteristic of effective monitoring tool is that it must provide both graphical and numerical representations of the system at any point of time[1]. Monitoring tools are important programs to verify the wellbeing of the network. The main task of the network monitoring is to continuously monitor computer network for breakdown or failing part of the system and it triggers a notification to the network administrator under any of such circumstances. Network monitoring includes numerous methods which are installed to preserve the integrity and security of the network. To monitor the system behaviour following parameters are identified Host ID, IP address, Network ID, File Name, Memory Utilization, Process Utilization and Bandwidth Utilization, Network monitoring systems and intrusion detection system are two mutually exclusive systems. The advantages of having a network monitoring tool.
PROPOSED SYSTEM :
The entire work is divided into 5 stages. Collecting information regarding the distributed systems and then building it is done in the first stage. The architecture of a distributed system consists of workstations collection and server connected by a Local Area Network. Monitoring the distributed file sharing is done in the second stage. This monitoring is responsible for collecting and analysing the different issues that arise in distributed systems by having a centralized monitor. The several parameters of monitoring address the questions such as what can be monitored, how can be monitored and what level of details to be monitored [9]. In the third stage, the information collected through monitoring is stored in a centralized database. So that the information can be re-used for later usage if needed. In the fourth stage, external hacker such as Wireshark[8] has been used to check how secure the proposed distributed system is. In the final stage, security metrics are calculated to determine the secure transferring of files between the user’s system and monitoring system.
SYSTEM REQUIREMENTS
SOFTWARE REQUIREMENTS:
• Programming Language : Python
• Font End Technologies : TKInter/Web(HTML,CSS,JS)
• IDE : Jupyter/Spyder/VS Code
• Operating System : Windows 08/10
HARDWARE REQUIREMENTS:
Processor : Core I3
RAM Capacity : 2 GB
Hard Disk : 250 GB
Monitor : 15″ Color
Mouse : 2 or 3 Button Mouse
Key Board : Windows 08/10